Security experts have raised the risk assessment to medium on the recently discovered [email protected] worm, also known as Mydoom.bb, after receiving reports that the infection is spreading in the wild.
According to McAfee's Avert antivirus team, more than 50 reports of the virus being stopped or infecting users from the field have been recorded. Most of these reports have arrived from the US, though Avert has also received reports from Australia and the UK.
Mydoom.bb is similar to previous variants with a mass-mailing worm constructing messages using its own SMTP engine. It contains a peer-to-peer propagation routine and may be a .exe file. In common with other mutants it also downloads the BackDoor-CEB.f Trojan and spoofs the 'from' address.
Users are advised to be "very wary" and should most likely delete any email containing the following headers:
Message could not be delivered
Mail System Error - Returned Mail
Delivery reports about your e-mail
Returned mail: see transcript for details
Returned mail: Data format error
The virus constructs messages from pools of strings it carries in its body. After being executed, Mydoom.bb copies itself into the Windows System directory, and the worm installs itself as JAVA.EXE in the directory.
It will show Windows Explorer listening on TCP Port 1034, the port on which the web server runs. More information can be found here.
Microsoft comes up with a new way to foist its unloved and little used Edge web browser on people
Facebook suspends Cambridge Analytica following weekend claims that it illegally harvested information from 50 million users
Insider claims Cambridge Analytica used academic app to filch Facebook data of 50 million users
Is the Samsung Galaxy S9+ worth its high price?